Kit prep
Kit Prep is an app designed to help manage drug pack logistics and station based drugs. This includes supporting processes around: replenishment, delivery, usage and inventory of drug packs, as well as usage and inventory of station based drugs. Kit Prep helps reduce paperwork, improve inventory accuracy and support operations.
Features
- Specially developed for healthcare medicines management across multiple sites
- Live view of drug pack inventory across whole network
- Able to track and manage individual drug packs and users
- Specialised apps adapted for each part of medicines supply chain
- Customisable for different drug pack configurations and access roles
- API feed into customer data warehouse for detailed reporting
- Integration with existing data sources (e.g. ESR for login)
- Camera and Bluetooth scanning options for quick data entry
- Ability to self administer the system
- Able to integrate with paper or electronic drug usage forms
Benefits
- Provides medicines management assurance across multiple sites
- Simple iOS interface makes the system easy for staff
- Significantly reduced effort and paperwork
- Able to deploy and manage at scale through MDM
- Reporting allows detailed audit and compliance checks
- Excellent CQC evidence of medicines management assurance
- Operational oversight of inventory and stock levels
- Warns staff on medicines issues e.g. expired drugs
- Proven solution in use in major ambulance service
- Staff able to instantly report medicines management issues
Pricing
£3,000 to £4,000 a unit a year
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
6 7 3 7 4 8 1 6 8 0 2 5 9 7 6
Contact
TENDABLE LIMITED
Robert Thornton
Telephone: 020 7435 7349
Email: finance@tendable.com
Service scope
- Software add-on or extension
- No
- Cloud deployment model
- Public cloud
- Service constraints
- Kit Prep is available on iOS tablets. It aims to be backwards compatible providing support to devices on the two previous OS versions. The app requires internet access
- System requirements
-
- Compatible iOS devices
- Internet access
- Ability to upgrade to the latest version of the app
- Licences require for usage
- Compatible processes and approach
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Our response times are typically within 24 hours between Monday to Friday 09:00 to 17:30 GMT excluding English bank holidays. We may take longer to respond outside office hours.
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- None or don’t know
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
- Online, email and phone support is included within the software licence fee. On site support will be provided at a cost (from £850 per day ex VAT, depending on level of support required)
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- All users will be provided with all the material they need to get up and running including Registration documentation as well as User guides and Getting Started guidance. Supported implementation provides onsite training and set up support and can be tailored to each customer's requirements.
- Service documentation
- No
- End-of-contract data extraction
- Users will be provided with an electronic copy of their data in flat data format.
- End-of-contract process
- Included in the price of the contract: At the end of contract, the customer will have the option for Kit Prep to archive or delete their data. Users will be provided with an electronic copy of their data in flat data format. All users access to the Kit Prep application will be revoked. Not included in the price of the contract: Any additional requirements such as tailored data or reports will be subject to additional costs.
Using the service
- Web browser interface
- No
- Application to install
- Yes
- Compatible operating systems
- IOS
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- The services is only designed to work on iOS ipads/ tablet devices and does not work on desktops.
- Service interface
- No
- User support accessibility
- None or don’t know
- API
- Yes
- What users can and can't do using the API
- Reporting data can be accessed through the API.
- API documentation
- Yes
- API documentation formats
- API sandbox or test environment
- No
- Customisation available
- No
Scaling
- Independence of resources
- The system is sized above the current demand but allows services to be scaled to meet demand. The system is monitored to identify when extra resources are required to be deployed.
Analytics
- Service usage metrics
- Yes
- Metrics types
- Usage metrics are provided through a specific reporting app and the reporting API
- Reporting types
- API access
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Conforms to BS7858:2019
- Government security clearance
- Up to Baseline Personnel Security Standard (BPSS)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- No
- Datacentre security standards
- Supplier-defined controls
- Penetration testing frequency
- Less than once a year
- Penetration testing approach
- ‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider
- Protecting data at rest
- Other
- Other data at rest protection approach
- Data at rest protection is encrypted and assured by the Service provider.
- Data sanitisation process
- No
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Data importing and exporting
- Data export approach
- Data is provided to customers data warehouses
- Data export formats
- Other
- Other data export formats
- JSON SQL
- Data import formats
- CSV
Data-in-transit protection
- Data protection between buyer and supplier networks
- TLS (version 1.2 or above)
- Data protection within supplier network
- TLS (version 1.2 or above)
Availability and resilience
- Guaranteed availability
- 98% service availability, assured by Cloud Service provider assertion
- Approach to resilience
- Available on request
- Outage reporting
- Email alert
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- Public key authentication (including by TLS client certificate)
- Username or password
- Other
- Other user authentication
- Each registering user's details are validated with the nominated customer representative as an authorised user before the user is permitted to access the application. Access is then conducted through the app with this username and password, including SHA-2 and 2048-bit encryption. Unless specifically requested by the customer, users must register with their organisation email (i.e. not personal emails).
- Access restrictions in management interfaces and support channels
- Currently end-users do not have direct access to management interfaces / support channels; administration is managed through direct phone / email / in-person discussions with customers.
- Access restriction testing frequency
- At least once a year
- Management access authentication
-
- Public key authentication (including by TLS client certificate)
- Username or password
Audit information for users
- Access to user activity audit information
- Users contact the support team to get audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- At least 12 months
- How long system logs are stored for
- At least 12 months
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- BSI GROUP
- ISO/IEC 27001 accreditation date
- 12/01/24
- What the ISO/IEC 27001 doesn’t cover
- The entire business is covered by the ISO certification
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- Yes
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
- The CEO is the executive sponsor of our Information Security Management System. The CFO is the responsible for all Information Security. The Information Security Manager is responsible for ensuring the Information Security Management System is adhered to and remains appropriate. We are an ISO 27001 accredited organisation which has a full suite of information security policies and processes which covers all aspects of Access Control, Asset Management, HR Security, Systems acquisition, Development and Maintenance & Supplier Management.
Operational security
- Configuration and change management standard
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Configuration and change management approach
- Our product change process employs process management systems to record all change requests, tracking them through planning, development, and delivery. These systems provide a full change history of our products development. All changes are risk assessed based on the potential impact from both a functional and security to the service and a full roll back plan is in place.
- Vulnerability management type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Vulnerability management approach
- We conduct vulnerability scanning across all external company devices and systems through an external provider. Patches and remediations are to be deployed to devices and systems within 48 hours.
- Protective monitoring type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Protective monitoring approach
- We maintain logs of user activity, access to the system and have a process to review these logs for any suspicious activity. Any potential compromise will follow our internal security incident management policy for investigation and reporting. All data breaches will be assessed and where applicable be reported to the ICO where customer personal identifiable data is concerned within 72 hours.
- Incident management type
- Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
- Incident management approach
- We employ a security incident management policy as defined by our Information Security Management System which defines a common approach to the logging, assessment, reporting and resolution to each potential breach. All users are trained on this policy upon induction then at minimum once per year for a knowledge refresh or after a change ensuring they have the knowledge on reporting. The process is in place for any data or systems classified as private and/or confidential and includes personal data.
Secure development
- Approach to secure software development best practice
- Supplier-defined process
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Covid-19 recovery
- Tackling economic inequality
- Equal opportunity
- Wellbeing
Fighting climate change
As an application designed to remove physical processes and digitise, the service has an inherently positive impact on carbon footprint. Additionally cloud infrastructure, flexible working and remote support model all deliver a light carbon footprint of operation.Covid-19 recovery
Our solutions are designed around quality improvement and were used extensively to aid with COVID-19 assurance, training and guidance. As we move to a recovery environment our solutions are used to help reduce wasted capacity in the system, improve patient flow and drive operation efficiencies.Tackling economic inequality
Our solutions are created to ensure that any user from any background can adopt our application; using the same methodologies as android and IOS, therefore economic background should not be a barrier to using our tools. Additionally, our solutions are designed to support transient workforces across varied economic and geographic domains, for example audits can be completed offline so WIFI is not required in out of reach areas. Tendable participate in healthcare outreach projects in lesser developed healthcare systems alongside our customers to support the sharing of best practise.Equal opportunity
We are an equal opportunity employer, have an extremely diverse workforce and we value diversity of background, skill set and thought.Wellbeing
At Tendable we offer a psychologically safe workplace and ensure all team members have support they need, from our mental-health first aider programme to our external well-being support services. Our office spaces are designed to have a variety of different workspaces, have onsite gyms and yoga classes. For our customers we offer a tool build within our solution to gain quality assurance over the health and wellbeing of their workforce.
Pricing
- Price
- £3,000 to £4,000 a unit a year
- Discount for educational organisations
- No
- Free trial available
- Yes
- Description of free trial
- Time limited implementation of app to demonstrate efficacy and business case for customer